As part of an organization's ongoing vulnerability assessment program, the Chief Information Security Officer (CISO) wants to evaluate the organization's systems, personnel, and facilities for various threats. As part of the assessment, the CISO plans to engage an independent cybersecurity assessment firm to perform social engineering and physical penetration testing against the organization's corporate offices and remote locations. Which of the following techniques would MOST likely be employed as part of this assessment? (Choose three.)
DrDoMe
3 years, 7 months agoBig_Wes
3 years, 4 months agoD1960
3 years, 9 months agochris1025
3 years, 9 months ago